A new banking trojan, initially called 'Matrix Banker', has been spotted currently targeting Latin America -- or more specifically, Mexico and Peru. It seems...
Hi, what are you looking for?
A new banking trojan, initially called 'Matrix Banker', has been spotted currently targeting Latin America -- or more specifically, Mexico and Peru. It seems...
Earlier this week, a researcher analyzed a newly detected technique for delivering malware involving PowerPoint files and mouseover events. Today, Trend Micro has published...
The starting point for a new study from the Institute for Critical Infrastructure Technology is not new: "There are only two types of networks,...
Multiple vulnerabilities have been found in China's Foscam-made IP cameras. The vulnerabilities were reported to the manufacturer several months ago, but no fixes have...
Data center and cloud segmentation firm Illumio announced today that it has raised a further $125 million in a Series D funding round. This...
Organizations Are Still Failing to Upgrade Systems and Enforce Patches, Study Finds
Last week, Russian president Vladimir Putin apparently conceded that patriotic Russian hackers may have been involved in the DNC hacks last year. "If they...
Change Two to the National Industrial Security Program Operating Manual (NISPOM 2) came into force at the end of May 2017. One of the...
CyberWar Games Highlight the Increasing Danger from and to an Interconnected World"The next significant cyber attack will likely involve targeting the connected ecosystem of...
As of June 10 2017, users of the Social Security Administration (SSA) website will be required to use two-factor (2FA) authentication to gain access....
Cybersecurity is a form of asymmetric warfare. The attackers need to only succeed once; the defenders must succeed constantly. The attackers share weapons and...
Following what is now widespread practice among private industry tech giants, a new bill proposes to force the DHS to introduce its own public-sector...